U.S. DEPARTMENT OF COMMERCE UNITED STATES PATENT AND TRADEMARK OFFICE. Privacy Impact Assessment
|
|
- Conrad Carpenter
- 5 years ago
- Views:
Transcription
1 U.S. DEPARTMENT OF COMMERCE UNITED STATES PATENT AND TRADEMARK OFFICE Privacy Impact Assessment Database Services (DBS) PTOI March 20, 2012
2 Privacy Impact Assessment This Privacy Impact Assessment (PIA) is a requirement of the Privacy Act of 1987 and OMB Memorandum 03-22, OMB Guidance for Implementing the Privacy Provisions of the E-Government Act of A PIA documents the due diligence and oversight placed upon information associated with the project or system in question. Written from the System Owner s perspective for the American public, the PIA discloses what information is being collected, and how that information is protected. The intent is to build confidence that privacy information is secure, processes that utilize this information comply with Federal requirements, and more importantly, inform the privacy expectations of the American public. The Privacy Threshold Analysis (PTA) is a separate artifact that must be completed prior to beginning this PIA. In many cases, the PTA will be the only required artifact to satisfy DOC privacy considerations.
3 SYSTEM DESCRIPTION Database Services (DBS) is an Application information system, and provides a Database infrastructure to support the mission of USPTO Database needs. The DBS System is composed of a collection of various versions of Database systems. The subsystems within the DBS System are: Microsoft SQL Database Servers (MSSQL) Oracle (Oracle) MySQL (MySQL) MSSQL The Microsoft SQL databases management component is used by the USPTO Database Services Branch (DSB) to support USPTO applications with the retrieval and management of data in relational database management systems (RDBMS), database schema creation and modification, and database object access control management. The core of MSSQL is formed by a command language that allows the retrieval, insertion, updating, and deletion of data, and performing management and administrative functions. The only component for MSSQL that is covered under the DBSS Authorization Boundary is the database management components used to administer the MSSQL database instances within USPTO. The Database Services Branch manages and maintains database management software installed on enterprise and application servers. They perform database control and administration functions associated with database operations, performance, and integrity. Support services are also provided for developing Automated Information Systems (AIS's) such as requirements analysis, database design, and implementation and maintenance strategies of database applications. MySQL The MySQL database system is comprised of several instances, utilized by AIS within the USPTO organization. The databases are used to collect and store data that can be parsed and used to generate reports in several ways by running scripts in the MySQL application. The MySQL system utilizes the SQL language; the components utilized by MySQL are not within the boundary of this system and reside in the boundary based on the OS. The Database Administration Section (DAS) manages and maintains database management software installed on enterprise and application servers. They perform database control and administration functions associated with database operations, performance, and integrity. Support services are also provided for developing Automated Information Systems (AIS's) such as requirements analysis, database design, and implementation and maintenance strategies of database applications. Oracle The Oracle database system is comprised of multiple instances of the application, along with data storage. An instance consists of a set of operating-system processes and memory structures that interact with the storage. The Oracle Relational Database Management System (RDBMS) stores data logically in the form of table spaces and physically in the form of data files. The Database Services Branch manages and maintains database management software installed on enterprise and application servers. They perform database control and administration functions associated with database operations, performance, and integrity. Support services are
4 also provided for developing Automated Information Systems (AIS's) such as requirements analysis, database design, and implementation and maintenance strategies of database applications.
5 QUESTIONNAIRE 1. What information is collected (e.g., nature and source)? N/A, Data is not collected by the DBS system. Data is collected by USPTO systems and stored in database instances. The system that houses the instances is managed by the DBS system. There is a variety of information stored in databases that utilize the DBS software 2. Why is this information being collected (e.g., to determine eligibility)? N/A, Information is not directly collected or used by the DBS system. The data is collected by applications that utilize the database instances hosted by DBS. 3. What is the intended use of information (e.g., to verify existing data)? N/A. DBS houses the data that is stored via other information systems within USPTO. 4. With whom will the information be shared (e.g., another agency for a specified programmatic purpose)? N/A, The information maintained in the DBS databases is collected and utilized by USPTO AIS. The information is shared through the AIS and is not controlled by the DBS system. The information is shared with financial organizations to receive payment and with other government organizations such as Pay.gov on a need to know basis. 5. What opportunities do individuals have to decline to provide information (i.e., where providing information is voluntary) or to consent to particular uses of the information (other than required or authorized uses), and how can individuals grant consent? N/A, collection methods and the obligation to provide such information is not the responsibility of the DBS system. 6. How will the information be secured (e.g., administrative and technological controls)? Information within the databases will be secured consistent with government laws, regulations (e.g. NIST) and USPTO policy. 7. How will the data extract log and verify requirement be met? N/A, DBS houses the data that is stored via other information systems within USPTO. These other systems provide this functionality for the data that is being stored. 8. Is a system of records being created under the Privacy Act, 5 U.S.C. 552a? No, the DBS system is not responsible for the information or the records created within the instance. The record creation is the responsibility of the system collecting the information. The website provided provides all of the Systems of Records Notices for USPTO: 9. Are these records covered by a record control schedule approved by the National Archives and Records Administration (NARA)? Yes, the OCIO provides the requirements applicable to archiving and destroying information technology within USPTO.
6 SIGNATORY AUTHORITY Agreed: / / Larry Stanback Date Information System Owner Agreed: / / Rod Turk Date Senior Agency Information Security Officer Agreed: / / John B. Owens II Date Authorizing Official
7/21/2017. Privacy Impact Assessments. Privacy Impact Assessments. What is a Privacy Impact Assessment (PIA)? What is a PIA?
Presented by Khaliah Barnes Attorney Advisor Office of Privacy and Civil Liberties U.S. Department of Justice For the 10 th Annual American Society of Access Professionals, Inc. National Training Conference
More information8/28/2017. What Is a Federal Record? What is Records Management?
Ramona Branch Oliver US Department of Labor What Is a Federal Record? Records include all books, papers, maps, photographs, machine-readable materials, or other documentary materials, regardless of physical
More information5/6/2013. Creating and preserving records that contain adequate and proper documentation of the organization.
Jay Olin National Archives Ramona Branch Oliver Department of Labor ASAP 6 th Annual National Training Conference May 12-15, 15, 2013 What Is a Federal Record? Records include all books, papers, maps,
More informationGovernment Privacy. Julie Smith McEwen, CIPP/G, CISSP Principal Information Systems Privacy and Security Engineer
IAPP Privacy Certification Certified Information Privacy Professional/Government (CIPP/G) Government Privacy Julie Smith McEwen, CIPP/G, CISSP Principal Information Systems Privacy and Security Engineer
More informationCybersecurity & Privacy Enhancements
Business, Industry and Government Cybersecurity & Privacy Enhancements John Lainhart, Director, Grant Thornton The National Institute of Standards and Technology (NIST) is in the process of updating their
More informationStreamlined FISMA Compliance For Hosted Information Systems
Streamlined FISMA Compliance For Hosted Information Systems Faster Certification and Accreditation at a Reduced Cost IT-CNP, INC. WWW.GOVDATAHOSTING.COM WHITEPAPER :: Executive Summary Federal, State and
More informationDatabase Administrator 2
COMMONWEALTH OF PENNSYLVANIA invites applications for: Database Administrator 2 The Commonwealth of Pennsylvania is proud to be an equal opportunity employer supporting workplace diversity. SALARY: JOB
More informationTransatlantic Cybersecurity: The Need for Regulatory Coordination
Transatlantic Cybersecurity: The Need for Regulatory Coordination EU-US High Level Regulatory Cooperation Forum April 11, 2013 Bruce Levinson Levinson@TheCRE.com The Cybersecurity regulation will take
More informationDoes a SAS 70 Audit Leave you at Risk of a Security Exposure or Failure to Comply with FISMA?
Does a SAS 70 Audit Leave you at Risk of a Security Exposure or Failure to Comply with FISMA? A brief overview of security requirements for Federal government agencies applicable to contracted IT services,
More informationFISMAand the Risk Management Framework
FISMAand the Risk Management Framework The New Practice of Federal Cyber Security Stephen D. Gantz Daniel R. Phi I pott Darren Windham, Technical Editor ^jm* ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON
More informationProtecting Personally Identifiable Information (PII) Privacy Act Training for Housing Counselors
Protecting Personally Identifiable Information (PII) Privacy Act Training for Housing Counselors Presented by the Office of Housing Counseling and The Office of the Chief Information Officer Privacy Program
More informationStatement of Organization, Functions, and Delegations of Authority: Office of the
This document is scheduled to be published in the Federal Register on 07/27/2016 and available online at http://federalregister.gov/a/2016-17737, and on FDsys.gov 4184-40P DEPARTMENT OF HEALTH AND HUMAN
More informationInformation Systems Security Requirements for Federal GIS Initiatives
Requirements for Federal GIS Initiatives Alan R. Butler, CDP Senior Project Manager Penobscot Bay Media, LLC 32 Washington Street, Suite 230 Camden, ME 04841 1 Federal GIS "We are at risk," advises the
More informationOUTDATED. Policy and Procedures 1-12 : University Institutional Data Management Policy
Policy 1-16 Rev. Date: May 14, 2001 Back to Index Subject: WORLD WIDE WEB RESOURCES POLICY PURPOSE To outline the University's policy for students, faculty and staff concerning the use of the University's
More informationApplication and Instructions for Firms
United States Environmental Protection Agency Office of Prevention Pesticides, and Toxic Substances EPA 747-B-99-001 March 2010 https://www.epa.gov/lead Application and Instructions for Firms Applying
More informationOpportunity Lives Here
Opportunity Lives Here Southern Virginia Higher Education Center Policy Policy # 4107 Policy Title: INFORMATION TECHNOLOGY (IT) PHYSICAL ACCESS CONTROL POLICY Responsible Oversight Director: Chief Finance
More informationVaronis and FISMA Compliance
Contents of This White Paper Who Needs to Comply...2 What Are the Risks of Non-Compliance...2 How Varonis Can Help With FISMA Compliance...3 Mapping FISMA Requirements to Varonis Functionality...4 Varonis
More informationWhy is the CUI Program necessary?
Why is the CUI Program necessary? Executive departments and agencies apply their own ad-hoc policies and markings to unclassified information that requires safeguarding or dissemination controls, resulting
More informationDATA Act Information Model Schema (DAIMS) Architecture. U.S. Department of the Treasury
DATA Act Information Model Schema (DAIMS) Architecture U.S. Department of the Treasury September 22, 2017 Table of Contents 1. Introduction... 1 2. Conceptual Information Model... 2 3. Metadata... 4 4.
More informationWesley House data protection statement and privacy notice (short-course delegates)
Wesley House data protection statement and privacy notice (short-course delegates) This statement explains how Wesley House handles and uses personal data we collect about delegates on short courses held
More informationChapter 9 Section 3. Digital Imaging (Scanned) And Electronic (Born-Digital) Records Process And Formats
Records Management (RM) Chapter 9 Section 3 Digital Imaging (Scanned) And Electronic (Born-Digital) Records Process And Formats Revision: 1.0 GENERAL 1.1 The success of a digitized document conversion
More informationDISADVANTAGED BUSINESS ENTERPRISE PROGRAM. Unified Certification Program OKLAHOMA
DISADVANTAGED BUSINESS ENTERPRISE PROGRAM Unified Certification Program OKLAHOMA TABLE OF CONTENTS General... 1 Ratification Process... 1 Implementation Schedule... 2 Regulatory Requirements... 2 DBE Directory...
More informationUT HEALTH SAN ANTONIO HANDBOOK OF OPERATING PROCEDURES
ACCESS MANAGEMENT Policy UT Health San Antonio shall adopt access management processes to ensure that access to Information Resources is restricted to authorized users with minimal access rights necessary
More informationConference for Food Protection. Standards for Accreditation of Food Protection Manager Certification Programs. Frequently Asked Questions
Conference for Food Protection Standards for Accreditation of Food Protection Manager Certification Programs Frequently Asked Questions Q. What was the primary purpose for the Conference for Food Protection
More informationBasic Requirements for Research Infrastructures in Europe
Dated March 2011 A contribution by the working group 1 Access and Standards of the ESF Member Organisation Forum on Research Infrastructures. Endorsed by the EUROHORCs on 14 April 2011. Introduction This
More informationDFARS Defense Industrial Base Compliance Information
DFARS 252.204-7012 Defense Industrial Base Compliance Information Protecting Controlled Unclassified Information (CUI) Executive Order 13556 "Controlled Unclassified Information, November 2010 Established
More informationMicrosoft SDL 한국마이크로소프트보안프로그램매니저김홍석부장. Security Development Lifecycle and Building Secure Applications
Release Conception Microsoft SDL Security Development Lifecycle and Building Secure Applications KRnet 2010 2010. 6. 22. 한국마이크로소프트보안프로그램매니저김홍석부장 Hongseok.Kim@microsoft.com Agenda Applications under Attack
More informationDepartment of Veterans Affairs VA DIRECTIVE April 17, 2006 WEB PAGE PRIVACY POLICY
Department of Veterans Affairs VA DIRECTIVE 6502.3 Washington, DC 20420 Transmittal Sheet WEB PAGE PRIVACY POLICY 1. REASON FOR ISSUE: To establish policy for the Department of Veterans Affairs (VA) for
More information2017 NACHA Third-Party Sender Initiatives
2017 NACHA Third-Party Sender Initiatives Jordan Bennett Senior Director, Network Risk NACHA 2 MAC is an organization of Bankcard professionals involved in the risk management side of Card Processing.
More informationOpen Data Policy City of Irving
Open Data Policy City of Irving 1. PURPOSE: The City of Irving is committed to fostering open, transparent, and accessible city government, and recognizes that by sharing data freely, the city will generate
More informationHitachi Adapter for Oracle Enterprise Manager - Database Cloning
Hitachi Adapter for Oracle Enterprise Manager - Database Cloning v02.0.0 Release Notes Contents About This Document... 2 Intended Audience... 2 Getting Help... 2 About This Release... 2 Hardware Requirements...
More informationGovernment data matching and the Privacy Act 1988 (Cth)
Government data matching and the Privacy Act 1988 (Cth) Dimitrios (Jim) Kormas Assistant Director Privacy Assessments 17 May 2018 Brief overview of the OAIC, Privacy Act and Australian Privacy Principles
More informationDEFENSE SECURITY SERVICE PRIVACY IMPACT ASSESSMENT GUIDANCE AND TEMPLATE
DEFENSE SECURITY SERVICE PRIVACY IMPACT ASSESSMENT GUIDANCE AND TEMPLATE Version 1.0 28 October 2008 1 DSS PRIVACY IMPACT ASSESSMENT For Industrial Security Facilities Database (ISFD) Project Identifying
More informationGet Compliant with the New DFARS Cybersecurity Requirements
Get Compliant with the New DFARS 252.204-7012 Cybersecurity Requirements Reginald M. Jones ( Reggie ) Chair, Federal Government Contracts Practice Group rjones@foxrothschild.com; 202-461-3111 August 30,
More informationThe registration of Domain Names will be centralized and managed through all DOT accredited Registrars selected by the Registry.
DOT TLD REGISTRATION POLICY 1. ELIGIBILITY DOT is a closed, restricted Top Level Domain ( TLD ). Only DISH DBS Corporation and its Affiliates are eligible to register a Domain Name under the DOT TLD. If
More informationICGI Recommendations for Federal Public Websites
Get Email Updates Change Text Size A - Z Index Contact Us About Us Site Policies Suggest Content WEB CONTENT SOCIAL MEDIA MOBILE CHALLENGES & CONTESTS CONTACT CENTERS CUSTOMER Training EXPERIENCE Communities
More informationPayThankYou LLC Privacy Policy
PayThankYou LLC Privacy Policy Last Revised: August 7, 2017. The most current version of this Privacy Policy may be viewed at any time on the PayThankYou website. Summary This Privacy Policy covers the
More informationCOMPLIANCE SCOPING GUIDE
COMPLIANCE SCOPING GUIDE Version 2017.2 Disclaimer: This document is provided for REFERENCE purposes only. It does not render professional services and is not a substitute for professional services. If
More informationElectronic Signature Policy
Electronic Signature Policy Definitions The following terms are used in this policy. Term Definition Electronic Signature An electronic signature is a paperless method used to authorize or approve documents
More informationInformation Technology Security Plan (ITSP)
Information Technology Security Plan (ITSP) Table of Contents 1. Purpose... 3 2. Goal... 3 3. NIST Risk Management Framework... 3 4. Scope... 4 5. System Description... 4 6. Authorization Boundary... 5
More informationDIRECTIVE TRANSMITTAL
U.S. NUCLEAR REGULATORY COMMISSION DIRECTIVE TRANSMITTAL TN: DT-03-11 (REDACTED VERSION) To: NRC Management Directives Custodians Subject: Transmittal of Management Directive 12.5, NRC Automated Information
More informationSubject: University Information Technology Resource Security Policy: OUTDATED
Policy 1-18 Rev. 2 Date: September 7, 2006 Back to Index Subject: University Information Technology Resource Security Policy: I. PURPOSE II. University Information Technology Resources are at risk from
More informationInteragency Advisory Board Meeting Agenda, August 25, 2009
Interagency Advisory Board Meeting Agenda, August 25, 2009 1. Opening Remarks 2. Policy, process, regulations, technology, and infrastructure to employ HSPD-12 in USDA (Owen Unangst, USDA) 3. Policy and
More information2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY
2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY Purpose: The purpose of this policy is to provide instruction and information to staff, auditors, consultants, contractors and tenants on
More informationTelos and Amazon Web Services (AWS): Accelerating Secure and Compliant Cloud Deployments
` Telos and Amazon Web Services (AWS): Accelerating Secure and Compliant Cloud Deployments Telos Corporation 19886 Ashburn Road Ashburn, VA 24445 www.telos.com ` Introduction Telos Corporation and Amazon
More informationEDENRED COMMUTER BENEFITS SOLUTIONS, LLC PRIVACY POLICY. Updated: April 2017
This Privacy Policy (this Privacy Policy ) applies to Edenred Commuter Benefits Solutions, LLC, (the Company ) online interface (i.e., website or mobile application) and any Edenred Commuter Benefit Solutions,
More informationPrivacy Statement. Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information
Privacy Statement Introduction Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information about how IT Support (UK) Ltd handle personal information.
More informationThe information we collect
Phone: (02) 8035 8000 Web: www.carnextdoor.com.au Email: info@carnextdoor.com.au Address: Level 3, 55 Pyrmont Bridge Rd, Pyrmont, NSW, 2009 CAR NEXT DOOR PRIVACY POLICY AND CREDIT REPORTING POLICY Last
More informationPrivacy Roots: SORNs and PIAs. Systems of Records Notices TIMOTHY H. GRAHAM U.S. DEPARTMENT OF VETERANS AFFAIRS VETERANS HEALTH ADMINISTRATION
Privacy Roots: SORNs and PIAs Systems of Records Notices TIMOTHY H. GRAHAM U.S. DEPARTMENT OF VETERANS AFFAIRS VETERANS HEALTH ADMINISTRATION Policy Objectives of the Privacy Act To restrict disclosureof
More informationDATA PROTECTION AND PRIVACY POLICY
DATA PROTECTION AND PRIVACY POLICY Data Protection Act London Capital Group (Cyprus) Limited (LCG) may process information relating to you, including holding such information in a manual format or electronic
More informationCare Recruitment Matters Limited Privacy Notice
Care Recruitment Matters Limited Privacy Notice Care Recruitment Matters Limited (CRM) is a specialist recruitment agency, sourcing permanent candidates for companies focused in the Health and Social Care
More informationClient Registry. Privacy Impact Assessment Summary
Client Registry Privacy Impact Assessment Summary Copyright Notice Copyright 2011, ehealth Ontario All rights reserved Trademarks No part of this document may be reproduced in any form, including photocopying
More informationSUBJECT: Training Policy-04 Defense Finance and Accounting Service Civilian Certifications, and Related Expenses
DFAS-HR/AR MEMORANDUM FOR DFAS EMPLOYEES SUBJECT: Training Policy-04 Defense Finance and Accounting Service Civilian Licenses, Certifications, and Related Expenses References: (a) Title 5, United States
More informationCorporate Customer Creation Oracle FLEXCUBE Universal Banking Release [April] [2014] Oracle Part Number E
Corporate Customer Creation Oracle FLEXCUBE Universal Banking Release 11.83.03.0.0 [April] [2014] Oracle Part Number E80246-01 Corporate Customer Creation Table of Contents 1. CREATION OF CORPORATE CUSTOMER...
More informationSTRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE
STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority vested in me as President by the Constitution and the laws of the United States of America, it is hereby
More informationDEPARTMENT OF HOMELAND SECURITY RECORDS MANAGEMENT HANDBOOK
DEPARTMENT OF HOMELAND SECURITY RECORDS MANAGEMENT HANDBOOK V. 2 January 2005 0550 Publication Table of Contents CHAPTER 1: OVERVIEW...1 CHAPTER 2: DEFINITIONS...8 CHAPTER 3: ELECTRONIC MAIL RECORDS...9
More informationWhat information is collected from you and how it is used
Richmond Road Runners Club PRIVACY POLICY Board Approved: 10/11/2017 Our Commitment to Privacy Richmond Road Runners Club (RRRC) is the sole owner of the information collected on its sites and through
More informationISSUES FOR RESPONSIBLE USER-CENTRIC IDENTITY
ISSUES FOR RESPONSIBLE USER-CENTRIC IDENTITY November 2009 Version 1.0 In light of the announcement of a series of federal pilots for federated identity providers, we have analyzed the governance and policy
More informationfips185 U.S. DEPARTMENT OF COMMERCE/National Institute of Standards and Technology
FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION 185 1994 February 9 U.S. DEPARTMENT OF COMMERCE/National Institute of Standards and Technology ESCROWED ENCRYPTION STANDARD CATEGORY: TELECOMMUNICATIONS
More informationStart Oracle Health Insurance Back Office. Reading, Writing and Authorizing Oracle Health Insurance Application Files. version 1.2
Start Oracle Health Insurance Back Office Reading, Writing and Authorizing Oracle Health Insurance Application Files version 1.2 Part number: E41198_01 March 2013 Copyright 2011, 2013, Oracle and/or its
More informationPostal Inspection Service Mail Covers Program
Postal Inspection Service Mail Covers Program May 28, 2014 AUDIT REPORT Report Number HIGHLIGHTS BACKGROUND: In fiscal year 2013, the U.S. Postal Inspection Service processed about 49,000 mail covers.
More informationInformation Security Strategy
Security Strategy Document Owner : Chief Officer Version : 1.1 Date : May 2011 We will on request produce this Strategy, or particular parts of it, in other languages and formats, in order that everyone
More informationSAC PA Security Frameworks - FISMA and NIST
SAC PA Security Frameworks - FISMA and NIST 800-171 June 23, 2017 SECURITY FRAMEWORKS Chris Seiders, CISSP Scott Weinman, CISSP, CISA Agenda Compliance standards FISMA NIST SP 800-171 Importance of Compliance
More informationClick to edit Master title style
Federal Risk and Authorization Management Program Presenter Name: Peter Mell, Initial FedRAMP Program Manager FedRAMP Interagency Effort Started: October 2009 Created under the Federal Cloud Initiative
More informationUSING ADMINISTRATOR FEATURES
HYPERION FINANCIAL MANAGEMENT SYSTEM 9 RELEASE 9.3.1 USING ADMINISTRATOR FEATURES Oracle's Hyperion Financial Management System 9 Release 9.3 contains significant enhancements to administrator features
More informationThe Honest Advantage
The Honest Advantage READY TO CHALLENGE THE STATUS QUO GSA Security Policy and PCI Guidelines The GreenStar Alliance 2017 2017 GreenStar Alliance All Rights Reserved Table of Contents Table of Contents
More informationIntroduction to Administration
Oracle Enterprise Manager Ops Center Administer Your Environment Using Oracle Enterprise Manager Ops Center 12c Release 3 (12.3.0.0.0) E59991-01 June 2015 This guide provides an end-to-end example for
More informationPM Database Setup Oracle FLEXCUBE Universal Banking Release [May] [2016]
PM Database Setup Oracle FLEXCUBE Universal Banking Release 12.2.0.0.0 [May] [2016] Table of Contents 1. INSTALLING STANDALONE PAYMENTS... 1-1 1.1 INTRODUCTION... 1-1 1.2 CREATING PM SCHEMA... 1-1 1.2.2
More informationAutomatic Number Plate Recognition (ANPR) ANPR Strategy Infrastructure Development
Automatic Number Plate Recognition (ANPR) ANPR Strategy 2016-2020 Infrastructure Development Version 1 July 2017 Document Control Change Control Version Date Change Author 0.1 1 June 2016 Initial draft
More informationCommunity Organisation Current Account Additional Party Form
Community Organisation Current Account Additional Party Form Please complete this form in BLOCK CAPITALS and in black ink, mark the box with a cross where applicable. Please do not write on or mark this
More informationNotification Form AP50 Minor Update to Risk Management Programme Details
Notification Form AP50 Minor Update to Risk Management Programme Details Before you start, let s check that you have everything you need: You are filling out this form because you are making a minor amendment
More informationFederal Initiatives to Protect Controlled Unclassified Information in Nonfederal Information Systems Against Cyber Threats
May 20, 2015 Georgetown University Law Center Federal Initiatives to Protect Controlled Unclassified Information in Nonfederal Information Systems Against Cyber Threats Robert S. Metzger Rogers Joseph
More informationRBC Royal Bank Online Application Terms and Conditions
RBC Royal Bank Online Application Terms and Conditions Please review the following RBC Royal Bank Online Application Terms and Conditions (the Terms and Conditions ). You must read them, check the tick
More informationDefendX Software Control-Audit for Hitachi Installation Guide
DefendX Software Control-Audit for Hitachi Installation Guide Version 4.1 This guide details the method for the installation and initial configuration of DefendX Software Control-Audit for NAS, Hitachi
More informationUWTSD Group Data Protection Policy
UWTSD Group Data Protection Policy Contents Clause Page 1. Policy statement... 1 2. About this policy... 1 3. Definition of data protection terms... 1 4. Data protection principles..3 5. Fair and lawful
More informationINFORMATION ASSURANCE DIRECTORATE
National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Signature Repository A Signature Repository provides a group of signatures for use by network security tools such
More informationISOO CUI Overview for ACSAC
ISOO CUI Overview for ACSAC Briefing Outline ISOO Overview Overview of the CUI Program CUI and IT Implementation CUI and NIST Standards and Guidelines NIST SP 800-171 CUI Approach for the Contractor Environment
More informationCalifornia Code of Regulations TITLE 21. PUBLIC WORKS DIVISION 1. DEPARTMENT OF GENERAL SERVICES CHAPTER 1. OFFICE OF THE STATE ARCHITECT
California Code of Regulations TITLE 21. PUBLIC WORKS DIVISION 1. DEPARTMENT OF GENERAL SERVICES CHAPTER 1. OFFICE OF THE STATE ARCHITECT SUBCHAPTER 2.5. VOLUNTARY CERTIFIED ACCESS SPECIALIST PROGRAM Program
More informationContinuous Monitoring & Security Authorization XACTA IA MANAGER: COST SAVINGS AND RETURN ON INVESTMENT IA MANAGER
Continuous Monitoring & Security Authorization XACTA IA MANAGER: COST SAVINGS AND RETURN ON INVESTMENT IA MANAGER Continuous Monitoring & Security Authorization >> TOTAL COST OF OWNERSHIP Xacta IA Manager
More informationFrequently Asked Question Regarding 201 CMR 17.00
Frequently Asked Question Regarding 201 CMR 17.00 What are the differences between this version of 201 CMR 17.00 and the version issued in February of 2009? There are some important differences in the
More informationHitachi Storage Adapter for Microsoft System Center Virtual Machine Manager
Hitachi Storage Adapter for Microsoft System Center Virtual Machine Manager v01.3.0 Release Notes Contents About This Document... 2 Intended Audience... 2 Getting Help... 2 Hardware Requirements... 3 Volume
More informationMile Privacy Policy. Ticket payment platform with Blockchain. Airline mileage system utilizing Ethereum platform. Mileico.com
Mile Privacy Policy Ticket payment platform with Blockchain Version 1.1 Feb 2018 [ Mile ] www.mileico.com Airline mileage system utilizing Ethereum platform Chapter 1 General Provisions Article_1 (Basic
More informationMICROSOFT SQL SERVER 2016 SECURITY TECHNICAL IMPLEMENTATION GUIDE (STIG) OVERVIEW. Version 1, Release March 2018
MICROSOFT SQL SERVER 2016 SECURITY TECHNICAL IMPLEMENTATION GUIDE (STIG) OVERVIEW Version 1, Release 1 09 March 2018 Developed by Microsoft and for the DoD Trademark Information Names, products, and services
More informationThis is to certify that. Chris FitzGerald. has completed the course. Systems Security Engineering _eng 2/10/08
This is to certify that Chris FitzGerald has completed the course Systems Security Engineering - 206760_eng on 2/10/08 Systems Security Engineering About This Course Overview/Description To define the
More informationNISP Update NDIA/AIA John P. Fitzpatrick, Director May 19, 2015
NISP Update NDIA/AIA John P. Fitzpatrick, Director May 19, 2015 Agenda Cybersecurity Information Sharing and the NISP NISP Working Group Update CUI Program Update 2 Executive Order 13691 Promoting Private
More informationINFORMATION ASSURANCE DIRECTORATE
National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Risk Monitoring Risk Monitoring assesses the effectiveness of the risk decisions that are made by the Enterprise.
More informationSafaricom Data Privacy Statement
Safaricom Data Privacy Statement Page 1 of 7 Table of Content 1.0 Introduction... 3 2.0 Definitions... 3 3.0 Statement Details... 3 3.1 Collection of Information... 3 3.2 What Customer Information is Collected?...
More informationCanadian Anti-Spam Legislation (CASL) Compliance Policy. 2. Adopt Canadian Anti-Spam Legislation (CASL) Compliance Policy.
NO: R055 COUNCIL DATE: April 27, 2015 REGULAR COUNCIL TO: Mayor & Council DATE: March 30, 2015 FROM: City Clerk FILE: 0625-20 SUBJECT: Canadian Anti-Spam Legislation (CASL) Compliance Policy RECOMMENDATION
More informationMIS Week 9 Host Hardening
MIS 5214 Week 9 Host Hardening Agenda NIST Risk Management Framework A quick review Implementing controls Host hardening Security configuration checklist (w/disa STIG Viewer) NIST 800-53Ar4 How Controls
More informationGRANTS AND CONTRIBUTIONS ONLINE SERVICES USER GUIDE: CANADA SUMMER JOBS
GRANTS AND CONTRIBUTIONS ONLINE SERVICES USER GUIDE: CANADA SUMMER JOBS DECEMBER 2017 TABLE OF CONTENTS IMPORTANT THINGS TO REMEMBER... 4 1. APPLYING FOR THE CANADA SUMMER JOBS PROGRAM... 4 1.1 Creating
More informationVirginia State University Policies Manual. Title: Information Security Program Policy: 6110
Purpose Virginia State University (VSU) uses information to perform the business services and functions necessary to fulfill its mission. VSU information is contained in many different mediums including
More informationDEPARTMENT OF HEALTH and HUMAN SERVICES. HANDBOOK for
DEPARTMENT OF HEALTH and HUMAN SERVICES HANDBOOK for FEDERAL ACQUISITION CERTIFICATION PROGRAM/PROJECT MANAGERS Issuer Office of the Secretary Office of the Assistant Secretary for Financial Resources
More informationTERMS AND CONDITIONS FOR THE USE OF THE WEBSITE AND PRIVACY POLICY
TERMS AND CONDITIONS FOR THE USE OF THE WEBSITE AND PRIVACY POLICY Trademarks-Intellectual Property Rights Xtrade BLZ (hereinafter called the Company or we or us) is the owner of the Copyright in the pages
More informationGovernment of Ontario IT Standard (GO-ITS) GO-ITS Number 30.7 OPS Backup & Restore Software Suite. Version #: 1.0 Status: Approved
Government of Ontario IT Standard (GO-ITS) GO-ITS Number 30.7 OPS Backup & Restore Software Suite Version #: 1.0 Status: Approved Prepared for the Information Technology Standards Council (ITSC) under
More informationThe HITRUST CSF. A Revolutionary Way to Protect Electronic Health Information
The HITRUST CSF A Revolutionary Way to Protect Electronic Health Information June 2015 The HITRUST CSF 2 Organizations in the healthcare industry are under immense pressure to improve quality, reduce complexity,
More informationSTUDENT GUIDE Risk Management Framework Step 1: Categorization of the Information System
Slide 1 RMF Overview RMF Module 1 RMF takes into account the organization as a whole, including strategic goals and objectives and relationships between mission/business processes, the supporting information
More informationNational Defense University and IRMC. National Defense University
The Forgotten Information Assurance Professional - Educating the Senior IT Manager Robert C. Norris, Jr. Information Resources Management College National Defense University 1 Overview Intro to IRMC and
More informationIBM Tivoli Monitoring for Databases. Release Notes. Version SC
IBM Tivoli Monitoring for Databases Release Notes Version 5.1.1 SC23-4851-00 IBM Tivoli Monitoring for Databases Release Notes Version 5.1.1 SC23-4851-00 Note Before using this information and the product
More informationCustomer Compliance Portal. User Guide V2.0
Customer Compliance Portal User Guide V2.0 0 Copyright 2016 Merchant Preservation Services, LLC. All rights reserved. CampusGuard, the Merchant Preservation Services logo, and the CampusGuard logo are
More informationAs set out in the Hong Kong ID card, or any relevant identification document referred to in 1(g) above.
As set out in the Hong Kong ID card, or any relevant identification document referred to in 1(g) above. B (1)B (2) * In the case of a non-hong Kong ID cardholder, state the passport number or any identification
More information